CEH v11: Metadata, Wordlists, Email, WHOIS & DNS Recon

Ethical Hacker v11    |    Intermediate
  • 4 videos | 54m 26s
  • Includes Assessment
  • Earns a Badge
When you're looking for useful target information, you want to pull from every available source. In this course, you'll investigate how to gather and inspect metadata for possible sensitive info about a target. You'll learn how to use wordlists for fuzzing and password attacks, about the usefulness of custom wordlists, and how to generate a wordlist based off the target's web presence. Next, you'll examine how e-mail tracking systems can glean info like IP addresses, geolocation, and host operating systems. Finally, you'll learn about useful information that can be found using WHOIS and DNS service. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.

WHAT YOU WILL LEARN

  • recognize tools used to extract metadata
    recognize tools used to locate files on a website
    identify the location of sample word list files in Kali Linux
    recognize tools that can be used to create custom word list files
    identify the term used for files that contain common words and passwords
  • recognize tools used for email tracking
    recognize commands used to enumerate DNS
    identify the different types of whois models
    identify tools used to perform whois searches

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.